answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What layer of OSI model does HTTP operate?

HTTPS is not a separate protocol, but refers to use of ordinary HTTP over an encrypted Secure Sockets Layer (SSL) or Transport Layer Security (TLS) connection. So it really does not have a place per say, because it's not a protocol it's a hybrid. Or you can say it originates in the Application layer and then finishes in the Presentation layer.

How is a cidr subnet mask implied?

With CIDR and VLSM, the subnet mask can no longer be implied. The routing protocol must include information about the subnet mask, when a router sends updates to other routers. This makes some older routing protocols unsuitable for such cases; for example, RIP version 1 is unsuitable, but RIP version 2 was changed so that it included the subnet mask.

With CIDR and VLSM, the subnet mask can no longer be implied. The routing protocol must include information about the subnet mask, when a router sends updates to other routers. This makes some older routing protocols unsuitable for such cases; for example, RIP version 1 is unsuitable, but RIP version 2 was changed so that it included the subnet mask.

With CIDR and VLSM, the subnet mask can no longer be implied. The routing protocol must include information about the subnet mask, when a router sends updates to other routers. This makes some older routing protocols unsuitable for such cases; for example, RIP version 1 is unsuitable, but RIP version 2 was changed so that it included the subnet mask.

With CIDR and VLSM, the subnet mask can no longer be implied. The routing protocol must include information about the subnet mask, when a router sends updates to other routers. This makes some older routing protocols unsuitable for such cases; for example, RIP version 1 is unsuitable, but RIP version 2 was changed so that it included the subnet mask.

Calculate the number of hosts for a specified network?

Write the subnet mask in binary. The zeroes at the end represent the host bits, and therefore, the size of the network. If (for example) you have ten zeroes at the end, you rais 210 = 1024. That's the number of addresses in the network. Of these, the first and the last are reserved for special purposes, and can't be used for host addresses, so the complete calculation (in this case) is 210 - 2.

Write the subnet mask in binary. The zeroes at the end represent the host bits, and therefore, the size of the network. If (for example) you have ten zeroes at the end, you rais 210 = 1024. That's the number of addresses in the network. Of these, the first and the last are reserved for special purposes, and can't be used for host addresses, so the complete calculation (in this case) is 210 - 2.

Write the subnet mask in binary. The zeroes at the end represent the host bits, and therefore, the size of the network. If (for example) you have ten zeroes at the end, you rais 210 = 1024. That's the number of addresses in the network. Of these, the first and the last are reserved for special purposes, and can't be used for host addresses, so the complete calculation (in this case) is 210 - 2.

Write the subnet mask in binary. The zeroes at the end represent the host bits, and therefore, the size of the network. If (for example) you have ten zeroes at the end, you rais 210 = 1024. That's the number of addresses in the network. Of these, the first and the last are reserved for special purposes, and can't be used for host addresses, so the complete calculation (in this case) is 210 - 2.

Difference between context switching and schedulling?

Scheduling has to do with how the job scheduler decides which task will have the CPU and for how long. This is the technique of multi-tasking; the appearance of running multiple processes at the same time (when they really aren't).

Context switching occurs when a process needs to do something in a privileged way, such as requiring communication with another hardware device. When the process is typically running it is in user mode, which is a non-privileged mode of operation. It has to context switch into kernel (privileged) mode to do things, then switch back.

The main difference between the two is that context switches happen in a non-predictive manner in the same program/process, and job scheduling is predictable (to a point).

Then again, they serve different needs of the Operating System, as well.

What is Pull server?

A 'Pull" server is one in which information is stored on it, waiting for a client to request the information, such as an upgrade. The information must be 'pulled' from the server by the client, so the client is the one initiating the request, not the server.

What happen during segmentation in transport layer protocol?

The original data stream is broken into pieces, called "segments"; each segment is numbered (numbering is by bytes, not by segments). Other header information is added too, for example, the origin and destination port numbers.

The original data stream is broken into pieces, called "segments"; each segment is numbered (numbering is by bytes, not by segments). Other header information is added too, for example, the origin and destination port numbers.

The original data stream is broken into pieces, called "segments"; each segment is numbered (numbering is by bytes, not by segments). Other header information is added too, for example, the origin and destination port numbers.

The original data stream is broken into pieces, called "segments"; each segment is numbered (numbering is by bytes, not by segments). Other header information is added too, for example, the origin and destination port numbers.

A wave with what frequencies would have shortest wavelength 10MHz 100MHz 1GHz 100GHz?

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

For the same speed of a wave (I suppose you are referring to electromagnetic waves), the highest frequency corresponds to the shortest wavelength.

What are the advantages to creating separate subnets and domains per department in a large corporation?

Creating multiple subnets for different departments allows for many benefits, such as:

-Breaking up large broadcast domains, this reduces the chances of a broadcast storm and also will also reduce the impact when broadcast are sent out.

-Separation of services, this helps keep people from HR from accessing files in the engineering department who dont need to.

-Enhanced security, if a worm break out occurs in one subnet it will be a little harder for that worm to propagate along side making it harder for "hackers" to gain full control of network resources or do a fullsystem mapping of a corporate network.

What is a bit related to IP addresses?

A bit is a binary digit - a digit that can be either a "one" or a "zero" (or true/false, or yes/no - the idea is that there are two different states).

Each IP address contains 32 bits. That's version 4, the IP currently used. In IP version 6 (expected to be used fairly soon, due to lack of addresses in IP version 4), each IP address has 128 bits.

A bit is a binary digit - a digit that can be either a "one" or a "zero" (or true/false, or yes/no - the idea is that there are two different states).

Each IP address contains 32 bits. That's version 4, the IP currently used. In IP version 6 (expected to be used fairly soon, due to lack of addresses in IP version 4), each IP address has 128 bits.

A bit is a binary digit - a digit that can be either a "one" or a "zero" (or true/false, or yes/no - the idea is that there are two different states).

Each IP address contains 32 bits. That's version 4, the IP currently used. In IP version 6 (expected to be used fairly soon, due to lack of addresses in IP version 4), each IP address has 128 bits.

A bit is a binary digit - a digit that can be either a "one" or a "zero" (or true/false, or yes/no - the idea is that there are two different states).

Each IP address contains 32 bits. That's version 4, the IP currently used. In IP version 6 (expected to be used fairly soon, due to lack of addresses in IP version 4), each IP address has 128 bits.

Iptables rule to block traffic from 10.14.34.207?

we can use access control list for block iptables...............and how is possible that the sender dont know that all traffic was blocked

Is FDDI a ring netwok?

FDDI is a dual-ring structure, usually found in MANs (metropolitan area networks). Although it has a physical ring structure it is not the same as a token ring network.

How is topology useful?

Topology answers the question about how a network is physically wired. It also places constraints on the number of clients and how they are connected, not to mention the distances between systems. So knowing the topology in use gives the network technician an idea of limitations and growth potentials, not to mention troubleshooting.

All subnet mask consist of a series of 1 bits followed by a series of 0 bits What does the series of 1 bits indicate?

The 1 bits indicate the use and presence of the network id information. 0 bits represent the location of client information.

What network device receives a signal and then transports a signal to all other nodes connected to it?

Traditionally a hub or repeater would put signals on all other nodes connected to it. If this is a broadcast signal, then any device (with the exception of a router) would present signals to all other devices connected to it.

Can a Linksys wrt54gs wireless router and a linksys befsr41 router be use both together?

sure why not.

are you going to do a double NAT?

do you have multiple static IP addresses from your ISP?

or are you just going to static IP one of them and turn DHCP off on that one, and just use it as a switch?

You are using Skype to initiate a video call with a friend in another state what protocols is generating segments at the Transport layer of this transmission?

Answer B

UDP (UDP is preferred over TCP foe real time applications such as videoconferences. UDP and TCP operate at the transport layer).

Page 554

What is the difference between Ethernet and serial?

Ethernet is the Technology which is Best Situated to LAN , Ethernet has all Features which LAN Need

Like High Bandwidth cost Of Deployement,and Coverage

Where as Serial Technology,

is Best Situated for MAN and WAN , they received data in packet and transmit to long distance they have Control Signal Also who Safe data from error and Corrupt

In Ethernet data are not check Bit Wise(LAck of Control Signal)

In Serial Technology data are check Bit Wise

Which network does 3 use?

Can't tell -- what is network 3 (missing diagram?)

Identify the class of an IP address based on the network number?

In classful addressing, the class of an IP address can be determined by the value in the first octet:

0 - 126 class A

128 - 191 class B

192 - 223 class C

What is the network address of the host IP address 172.32.48.128?

Depends on your subnet mask. If you are talking about a classful addressing scheme in a class B, then the network would be 172.32.0.0